OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.24%
  • Veröffentlicht 13.11.2024 11:15:04
  • Zuletzt bearbeitet 04.11.2025 18:16:42

Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid...

  • EPSS 0.66%
  • Veröffentlicht 16.10.2024 17:15:18
  • Zuletzt bearbeitet 03.11.2025 23:17:33

Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or ...

  • EPSS 5.69%
  • Veröffentlicht 03.09.2024 16:15:07
  • Zuletzt bearbeitet 03.06.2025 10:51:54

Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...

  • EPSS 4.49%
  • Veröffentlicht 27.06.2024 11:15:24
  • Zuletzt bearbeitet 03.11.2025 23:17:30

Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential conseq...

  • EPSS 0.08%
  • Veröffentlicht 16.05.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 09:43:11

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long d...

  • EPSS 0.65%
  • Veröffentlicht 14.05.2024 15:08:51
  • Zuletzt bearbeitet 03.11.2025 21:16:07

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires...

  • EPSS 0.52%
  • Veröffentlicht 25.04.2024 07:15:45
  • Zuletzt bearbeitet 21.11.2024 08:43:25

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checke...

  • EPSS 3.67%
  • Veröffentlicht 08.04.2024 14:15:07
  • Zuletzt bearbeitet 03.11.2025 22:16:50

Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to ...

  • EPSS 0.19%
  • Veröffentlicht 26.01.2024 09:15:07
  • Zuletzt bearbeitet 03.11.2025 22:16:34

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. ...

  • EPSS 2.31%
  • Veröffentlicht 09.01.2024 17:15:12
  • Zuletzt bearbeitet 20.06.2025 16:15:27

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an a...